Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Search Results
Results: 1 through 1 of 1 (0.008 secs)
You searched for: mediatype:movies AND collection:opensecuritytraining AND subject:"Computers Security"
[movies]Day 2 Part 5: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computers Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,379
Advanced search

Group results by:

> Relevance

Related creators

Corey K.

Related mediatypes